Real-time Security in Sensor Networks in Sequential Approach with BWT Compression, Huffman Coding and Reduced Array Encryption

M. Baritha Begum

Journal of Systems Science and Systems Engineering ›› : 1 -45.

PDF
Journal of Systems Science and Systems Engineering ›› : 1 -45. DOI: 10.1007/s11518-025-5661-0
Article

Real-time Security in Sensor Networks in Sequential Approach with BWT Compression, Huffman Coding and Reduced Array Encryption

Author information +
History +
PDF

Abstract

This paper proposes a cutting-edge approach to data security and compression for secure data transmission in sensor networks. Combining advanced algorithms with encryption, it optimizes data flow and security. Real-time processing with cameras, sensors, and Microcontroller Units (MCUs) enables reliable handling, supporting low-latency applications like environmental monitoring, smart cities, and industrial automation. The method uses scrambled Burrows-Wheeler Transform (BWT) compression followed by Huffman coding. It also applies reduced array encryption through a sequential process. Compression ratios range from 90% to 95%, significantly reducing overall size. The implementation undergoes thorough security analysis, yielding high Unicity Distance metrics and superior Data Integrity. It protects against possible vulnerabilities. The method balances efficiency with improved security measures, ensuring seamless execution and reliable performance under fluctuating conditions. It provides optimum connectivity for large-scale operations.

Keywords

Data transmission / sensor networks / compression / encryption / security analysis / efficiency

Cite this article

Download citation ▾
M. Baritha Begum. Real-time Security in Sensor Networks in Sequential Approach with BWT Compression, Huffman Coding and Reduced Array Encryption. Journal of Systems Science and Systems Engineering 1-45 DOI:10.1007/s11518-025-5661-0

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

AbdulghaniH A, NijdamN A, CollenA, KonstantasD. A study on security and privacy guidelines, countermeasures, threats: IoT data at rest perspective. Symmetry, 2019, 11(6): 774

[2]

AfriyieR K, AsanteM, OnyemaE M. Implementing morpheme-based compression security mechanism in distributed systems. International Journal of Innovative Research and Development, 2020, 9(2): 157-162

[3]

Ali R H, Kadhim J M (2021). Text-based steganography using Huffman compression and AES encryption algorithm. Iraqi Journal of Science: 4110–4120.

[4]

CamtepeS, DudaJ, MahboubiA, MorawieckiP, NepalS, PawlowskiM, PieprzykJ. Compcryptlightweight ANS-based compression and encryption. IEEE Transactions on Information Forensics and Security, 2021, 16: 3859-3873

[5]

Chandnani N, Verma K (2023). A comparison on type-II fuzzy logic based data encryption techniques in the Internet of Things. Journal of Intelligent and Fuzzy Systems 44(2).

[6]

CuiL, SuX, MingZ, ChenZ, YangS, ZhouY, XiaoW. ZigBee-based IoT devices vulnerabilities and IDSs. IEEE Internet of Things Journal, 2022, 9(16): 14151-14161

[7]

DavidA O, EliaisA O. Fog computing and SDN in healthcare IoT. International Journal of Engineering and Applied Computer Science, 2022, 4(2): 14-18

[8]

FazeldehkordiE, GranliT-M. Security architectures for edge computing-based IoT. IoT, 2022, 3(3): 332-365

[9]

FerragM A, FrihaO, HamoudaD, MaglarasL, JanickeH. Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access, 2022, 10: 40281-40306

[10]

Hammad J A, Hmeed A R, Obaid A J (2023). Cerebral disorders diagnosis via secure transmission of multichannel EEG signals based on IoMT. Journal of Discrete Mathematical Sciences and Cryptography 26(7).

[11]

Ho E S L (2022). Data security challenges in deep neural network for healthcare IoT systems. Deep Neural Network for IoT Systems: 19–37.

[12]

Hoang T N, Kim D (2024). Supervised contrastive ResNet and transfer learning for the in-vehicle intrusion detection system. Expert Systems with Applications: 238.

[13]

HuH, CaoY, XuJ, MaC, YanH. An image compression and encryption algorithm based on the fractional-order simplest chaotic circuit. IEEE Access, 2021, 9: 22141-22155

[14]

HusseinN, NhlabatsiA. Living in the dark: MQTT-based exploitation of IoT security vulnerabilities in Zig-Bee networks for smart lighting control. IoT, 2022, 3(4): 450-472

[15]

PriyadharshiniK, CanessaneA. Security in data sharing for blockchain-intersected IoT using novel chaotic-RSA encryption. International Journal of Information Security and Privacy, 2022, 16(2): 1-15

[16]

KamalN F, MalluhiQ. Client-based secure IoT data sharing using untrusted clouds. Proceedings of the 2021 IEEE 7th World Forum on Internet of Things (WF-IoT), 2021409-414

[17]

KasapbasiM C. A new chaotic image steganography technique based on Huffman compression of Turkish texts and fractal encryption with post-quantum security. IEEE Access, 2019, 7: 148495-148510

[18]

Khan A A, Laghari A A, Elmannai H, Shaikh A A, Bourouis S, Hadjouni M, Alroobaea R (2023). GAN-IoTVS: A novel Internet of Multimedia Things-enabled video streaming compression model using GAN and fuzzy logic. IEEE Sensors Journal 23(23).

[19]

KhanA R, KashifM, JhaveriR H, RautR, SabaT, BahajS A. Deep learning for intrusion detection and security of Internet of Things (IoT): Current analysis, challenges, and possible solutions. Security and Communication Networks, 2022, 2022: 1-13

[20]

Kumhar M, Bhatia J (2023). Software-defined networks-enabled fog computing for IoT-based healthcare: Security, challenges and opportunities Security and Privacy 6(5).

[21]

KvammeS M, GudmundsenE, OyetoyanT D, CruzesD S. Data protection fortification: An agile approach for threat analysis of IoT data. Proceedings of the 12th International Conference on the Internet of Things, 2022151-154

[22]

LeeJ, LeeS. Robust CNN compression framework for security-sensitive embedded systems. Applied Sciences, 2021, 11(3): 1093

[23]

LiuJ, MiaoQ, FanX, WangX, LinH, HuangY. Mutual-supervised federated learning and blockchain-based IoT data sharing. Security and Communication Networks, 2022, 2022: 1-8

[24]

Lysynchuk V V (2022). Identification of the state of information security of IoT devices based on time series processing. Modern Information Security 3(51).

[25]

MothukuriV, KhareP, PariziR M, PouriyehS, DehghantanhaA, SrivastavaG. Federated learning-based anomaly detection for IoT security attacks. IEEE Internet of Things Journal, 2022, 9(4): 2545-2554

[26]

OlawaleA, AdebayoA, AromeG. Embedding text in audio steganography system using advanced encryption standard, text compression, and spread spectrum techniques in MP3 and MP4 file formats. International Journal of Computer Applications, 2020, 177(41): 46-51

[27]

Patidar S, Jindal R, Kumar N (2024). A secure and energy-efficient edge computing improved SZ 2.1 hybrid algorithm for handling IoT data stream. Multimedia Tools and Applications: 83629–83660.

[28]

RayS, MishraK N, DuttaS. Sensitive data identification and security assurance in cloud and IoT-based networks. International Journal of Computer Network and Information Security, 2022, 14(5): 11-27

[29]

SinghA K, ThakurS, JolfaeiA, SrivastavaG, ElhosenyM D, MohanA. Joint encryption and compression-based watermarking technique for security of digital documents. ACM Transactions on Internet Technology, 2021, 21(1): 1-20

[30]

SinghK N, SinghA K. Towards integrating image encryption with compression: A survey. ACM Transactions on Multimedia Computing, Communications, and Applications, 2022, 18(3): 1-21

[31]

Suo Z, Xia C, Jiang D, Peng H, Tong F, Chen X (2024). Multitiered reversible data privacy protection scheme for IoT based on compressive sensing and digital watermarking. IEEE Internet of Things Journal 11(7).

[32]

Sami T M G, Zeebaree S RM, Ahmed S H. (2023). A state-of-the-art survey for IoT security and energy management based on hashing algorithms. International Journal on Recent and Innovation Trends in Computing and Communication 11(10).

[33]

WahabO F A, KhalafA A M, HusseinA I, HamedH F A. Hiding data using efficient combination of RSA cryptography and compression steganography techniques. IEEE Access, 2021, 9: 31805-31815

[34]

WangB, WuF, LongY, RimanicL, ZhangC, LiB. DataLens: Scalable privacy-preserving training via gradient compression and aggregation. Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 20212146-2168

[35]

WangW, SunY, LiY. Security-enhanced certificate-based remote data integrity batch auditing for Cloud-IoT. Security and Communication Networks, 2022, 2022: 1-17

[36]

WangX, VeeravalliB, TanY, TongZ. Security and makespan trade-off strategy in fog-enabled IoT networks. Security and Communication Networks, 2022, 2022: 1-13

[37]

WangY, GuiG, GacaninH, OhtsukiT, DobreO A, PoorH V. An efficient specific emitter identification method based on complex-valued neural networks and network compression. IEEE Journal on Selected Areas in Communications, 2021, 39(8): 2305-2317

[38]

WheelusC, ZhuX. IoT network security: Threats, risks, and a data-driven defense framework. IoT, 2020, 1(2): 259-285

[39]

WiayaB A, SiboroS, BrutuM, LaseY K. Application of Huffman algorithm and unary codes for text file compression. SinkrOn, 2022, 7(3): 1000-1007

[40]

XuL D, LuY, LiL. Embedding blockchain technology into IoT for security: A survey. IEEE Internet of Things Journal, 2021, 8(13): 10452-10473

[41]

YadavA, SainiB, VermaV K, PalV. A joint medical image compression and encryption using AMBTC and hybrid chaotic system. Journal of Discrete Mathematical Sciences and Cryptography, 2021, 24(8): 2233-2244

[42]

ZhangM, TongX, WangZ, ChenP. Joint lossless image compression and encryption scheme based on CALIC and hyperchaotic system. Entropy, 2021, 23(8): 1096

[43]

ZhangM, TongX-J, LiuJ, WangZ, LiuJ, LiuB, MaJ. Image compression and encryption scheme based on compressive sensing and Fourier transform. IEEE Access, 2020, 8: 40838-40849

RIGHTS & PERMISSIONS

Systems Engineering Society of China and Springer-Verlag GmbH Germany

AI Summary AI Mindmap
PDF

285

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/